Perhaps, if you have a list of the plain text passwords in advance you
could use ClamAV. In our case, we don't as we're using an AD. I actually
copied the ClamAV tcp and local interface API so that any MTA which can
plug in to ClamAV is also able to plug into Kochi. That's one of the
ts us whenever anyone hits the limit. If it takes a phisher 2000
spams to get access to one account, but that one account only allows the
phisher to send 1000 spams, then it completely destroys the point of
what they're doing.
--
Mike Cardwell https://grepular.com/ https://twitter.com/mickeyc
t is much more responsive, especially on larger folders.
This is a real shame. IMAP can do so much more than Exchange's IMAP
implementation allows.
--
Mike Cardwell https://grepular.com/ https://twitter.com/mickeyc
Professional http://cardwellit.com/ http://linkedin.com/in/mi
Dovecot to shred it.. Ie, overwrite the file with random data and/or
null bytes before deletion. In the same way that GNU shred behaves:
https://www.gnu.org/software/coreutils/manual/html_node/shred-invocation.html
--
Mike Cardwell https://grepular.com/ https://twitter.com/mickeyc
Professi
this ability, or does it simply queue up
the commands and execute them synchronously in order?
--
Mike Cardwell - Perl/Java/Web developer, Linux admin, Email admin
Read my tech Blog - https://secure.grepular.com/
Follow me on Twitter - http://twitter.com/mickeyc
Hire me